Programs that can run independently and travel from machine
to machine across network connections, with the ability to
destroy data or utilize tremendous computer and
communication resources, are referred to as:
A. trojan horses.
B. viruses.
C. worms.
D. logic bombs.